we will transmit our hidden message with no escalating the bandwidth of the first message and without the need of manipulating the file structure, so there’s nothing at all for simple detection methods that rely on https://www.darkexploits.com/product/extremely-silent-jpg-exploit-new/